On Aug 2, 2015, at 9:46 PM, Zhiwei Yan <yanzhi...@cnnic.cn> wrote:
> -DDOS: the current situation is that it is very very easy to construct a DNS 
> packet and then the bandwidth requirement to defend DDOS continuely 
> increases. the additional cost will be introduced in the "cookies" scheme, 
> but it will be more flexible in this case because it will be very easy to 
> diffentiate the packets-with-cookies and packets-without-cookies, and the 
> cost will be much lower compared with the DNSSEC

I alluded to this in my response to Donald, but just to expand on it a bit, 
this is only possible if the vast majority of the stub resolvers are doing 
cookies.   Otherwise, responding to a DDoS attack in this way does exactly what 
the attacker wants: it disables DNS resolution for your domain or for your 
users.   So this is not a valid use case for the draft unless you can explain 
how sufficient deployment would occur.

To illustrate what I am talking about, Google was unwilling to deploy AAAA 
records for their servers until the number of hosts that were able to succeed 
in connecting with the AAAA records present was >99.7%, if I remember that 
presentation correctly.   This is a very, very high bar.   If you are under a 
DDoS attack, of course, you may be willing to settle for a lower rate of 
success, but I would expect cookies to hover well under 50% pretty much 
forever, because there is no incentive for the host operating system vendor to 
implement it in the stub resolver, and look how long it took to get WinXP 
numbers down.   And that’s not even taking into account all the broken 
middleware out there, e.g. DNS proxies on home routers.   So even if vendors 
implement it, when will end-users deploy it?

In practice, therefore, in order to deal with DDoS attacks like this, the 
server weathering the attack will have to maintain state about clients, so that 
it continues to serve clients that don’t support cookies.   So we have 
additional code on the server, the ultimate result of which is that the server 
does substantial extra work, not less work, increasing, not decreasing, the 
effectiveness of the DDoS attack.

It’s certainly true that if support for cookies were near 100% in clients, and 
were not blocked by middleware, we could in fact turn off stateful heuristics 
and see a benefit from cookies, but that’s a really big if.   The incentives 
are all in the wrong places here.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to